Canada's own Tori and James (phlux) Brine, producing great sounding electronic music for the masses! We started this project in the late 1998. I decided to experiment with keyboards and synthesizers and started to get a little bit more serious with the idea. When I had produced my first (and roughest) CD, I sent it to my sister and she decided to add a little more to what I had composed. Since then, we have been expanding our ideas and trying to let the world hear what we have been making. I... Topic: Algorithm
Redundancy in Public-Private Key PairsLaverna J. ThurstonAbstractThe improvement of active networks is a compelling question. In this paper, we prove the emulation of journaling file systems. Our focus in this work is not on whether the much-touted lossless algorithm for the refinement of forward-error correction by Harris  is recursively enumerable, but rather on introducing an interposable tool for enabling cache coherence (Tarpon). Topic: algorithm
Melodies based on MIDImage 3 Demo Manipulated in Cubase Elements 7 Composed by Ludwig 3 (Chess algorithms) Mastered in Wavelab Elements 7 by using Reaktor 5.9 Ludwig songbase: MIDImage 3 more songbases for Ludwig 3 are here http://archive.org/details/Ludwig3-Addons Topic: algorithm composing
This chapter further extends the results obtained in chapters 4 and 5 (from linear equation to linear systems). Each algorithm is thoroughly proved and then an example is given.Five integer number algorithms to solve linear systems are further given. Topics: Algorithm, functions
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the... Topics: NIDS, Evasion, Apriori Algorithm, AdaBoost Algorithm, Snort
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the... Topics: NIDS, Evasion, Apriori Algorithm, Adaboost Algorithm, Snort
The first prime number with the special property that its addition with its reversal gives as result a prime number too is 299. The prime numbers with this property will be called Luhn prime numbers. In this article we intend to present a performing algorithm for determining the Luhn prime numbers. Topics: Luhn prime numbers, algorithm
In this course design and analysis of algorithms is studied. Methodologies include: divide and conquer, dynamic programming, and greedy strategies. Their applications involve: sorting, ordering and searching, graph algorithms, geometric algorithms, mathematical (number theory, algebra and linear algebra) algorithms, and string matching algorithms. We study algorithm analysis - worst case, average case, and amortized, with an emphasis on the close connection between the time complexity of an... favoritefavoritefavoritefavoritefavorite ( 8 reviews ) Topics: algorithms, algorithm design
An open source book that describes a large number of algorithmic techniques from the the fields of Biologically Inspired Computation, Computational Intelligence and Metaheuristics in a complete, consistent, and centralized manner such that they are accessible, usable, and understandable.https://github.com/jbrownlee/CleverAlgorithms Topics: compsci, algorithm, genetic
Thirteen papers on the history of Smarandache function, a sample of the infinity of unsolved problems associated with Smarandache function, a simple algorithm to calculate S(n), a proof of the non-existence of "Samma", and similar topics. Topics: Smarandache function, algorithm
Self Portrait using variation on the Mandelbrot Set equation, and a genetic algorithm that finds parameters that generate images using a 50X50 gif image of Ventrella's face as a fitness function. See http://www.ventrella.com/Tweaks/Portraits/ for more info Topics: Mandelbrot, portrait, genetic algorithm
Several robust eigenstructure assignment methods for MIMO systems try to exploit non-uniqueness of controller matrix to optimize certain performance index. In general these methods lead to computational intractability or become too conservative design. Therefore the scope of using randomized algorithms as an alternative exists. Based on well established statistical learning theory algorithms this paper provides methodologies to design robust controller under structured uncertainty by... Topics: Robust Eigenstructure, Randomized Algorithm
byS. Bhattacharya, F. Smarandache, M. Khoshnevisan
In this paper we have proposed a semi-heuristic optimization algorithm fordesigning optimal plant layouts in process-focused manufacturing/servicefacilities. Our proposed algorithm marries the well-known CRAFT (Computerized Relative Allocation of Facilities Technique) with the Hungarian assignment algorithm. Being a semi-heuristic search, MASS can be potentially more efficient in terms of CPU engagement time as it can converge on the global optimum faster than the traditional CRAFT, which is a... Topics: algorithm, pure heuristic
History of prime numbers The Sieve of Eratosthenes is a simple, ancient algorithm for finding all prime numbers up to a specified integer. It is the predecessor to the modern Sieve of Atkin, which is faster but more complex. The eponymous Sieve of Eratosthenes was created in the 3rd century BC by Eratosthenes, an ancient Greek mathematician. The Sieve of Eratosthenes is a simple, ancient algorithm for finding all prime numbers up to a specified integer. It is the predecessor to the modern Sieve... Topic: Prime Number Algorithm
Epidemic applications of power electronic basednon-linear loads result in increase of harmonics in the powersystem. The current harmonics produced by these non-linearloads result in voltage distortion and leads to various powerquality problems. So it is important to eliminate theharmonics in the power system. The harmonic eliminationthrough Shunt Active Power filter (SAPF) provides higherefficiency and more pliable when compared with passive filters.This paper presents a standard surrogate and... Topics: Power Quality, SAPF, PI Control Algorithm, Fuzzy Control Algorithm.
This paper designs a hybrid genetic algorithm for job-shop scheduling combined with a Genetic Algorithm (GA), Simulated Annealing (SA), and a Tabu Search (TS) algorithm. It gives a method for initial population generation for avoiding unreasonable solutions, and introduces SA and TS into the genetic operation mechanism of GA for overcoming the lack of job-shop scheduling optimization. Simulated computations show the superiority of the hybrid genetic algorithm, and examples verify the... Topics: Job-shop Scheduling, Genetic Algorithm, Simulated Annealing Algorithm, Tabu Search
This paper presents the application of Compressive Sensing (CS) theory in radar signal processing. CS uses the sparsity property to reduce the number of measurements needed for digital acquisition, which causes reduction in the size, weight, power consumption, and the cost of the CS radar receiver. Complex Approximate Message Passing (CAMP) algorithm is a fast iterative thresholding algorithm which is used to reconstruct the undersampled sparse radar signal, and to improve the Signal-to-Noise... Topics: Compressive Sensing, CAMP algorithm, Radar.
Martin Pelikan, & David E. Goldberg (2000). Hierarchical Problem Solving by the Bayesian Optimization Algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-200), 267-274. Also IlliGAL Report No. 2000002. Abstract: The paper discusses three major issues. First, it discusses why it makes sense to approach problems in a hierarchical fashion. It defines the class of hierarchically decomposable functions that can be used to test the algorithms that approach... Topics: hierarchical Bayesian optimization algorithm, hBOA, estimation of distribution algorithm, EDA
In the last few years, there has been explosive growth in the application of meta-heuristics algorithm for solving Sudoku puzzles in computer science. In this paper we present a hybrid genetic algorithm (HGA) that uses a “random” technology to improve the performance of genetic algorithm. We also show the performance of the algorithms for solving Sudoku puzzles with 46 different examples. The experimental results indicate that HGA is able to produce very competitive results with respect to... Topics: Sudoku, Hybrid Genetic Algorithm, Metaheuristics Algorithm, Optimization, Random Search Strategy
Multicast services are increased in exponential manner in these last few years and in particular in the field of multimedia services. Multicast can reduce resources allocation and enhance network performances in terms of QoS, especially in a wireless platforms where the bandwidth is a precious resource. The problem of multicast routing can be reduced to the problem of finding a spanning tree capable to distribute network flow among multicast sources and destinations. It has been established... Topics: Scalable Algorithm, Multicast routing, heterogeneous platforms, Genetic Algorithm, Simulated...
With the development of the digital devices, computers and networks, our world relies more and more on the digital data. In many cases, storing data safely is a very big concern. These data have to be protected so as to prevent the possible unauthorized access. Many technologies have been used to improve the security of the data storage. Encryption is a process of coding information which could either be a file or mail message in into cipher text a form unreadable without a decoding key in... Topics: RC4, AES, Chaos based algorithm
Improving Utilization of Infrastructure CloudA key advantage of Infrastructure-as-a-Service (IaaS) cloud is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either significantly overprovision their infrastructure (or pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the access is no longer on-demand). At the same time, not all users require truly on-demand access to... Topics: MFCC algorithm, Search Engine, Ranking algorithm, Information Retrieval
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of K-Means Clustering AlgorithmInformation world meet many confronts nowadays and one such, is data retrieval from a multidimensional and heterogeneous data set. Han & et al carried out a trail for the mentioned challenge. A novel feature co-selection for web document clustering is proposed by them, which is called Multitype Features Co-selection for Clustering (MFCC). MFCC uses intermediate clustering results in one... Topics: MFCC algorithm, Search Engine, Ranking algorithm, Information Retrieval
With the development of the digital devices, computers and networks, our world relies more and more on the digital data. Inmany cases, storing data safely is a very big concern. These data have to be protected so as to prevent the possible unauthorized access.Many technologies have been used to improve the security of the data storage. Encryption is a process of coding information whichcould either be a file or mail message in into cipher text a form unreadable without a decoding key in order... Topics: RC4, AES, Chaos based algorithm
byMartin Pelikan, David E. Goldberg, Erick Cantu-Paz
Martin Pelikan, David E. Goldberg, & Erick Cantú-Paz, E. (1999). BOA: The Bayesian optimization algorithm. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-99), I, 525-532. Also IlliGAL Report No. 99003. Abstract In this paper, an algorithm based on the concepts of genetic algorithms that uses an estimation of a probability distribution of promising solutions in order to generate new candidate solutions is proposed. To estimate the distribution, techniques for... Topics: Bayesian optimization algorithm, BOA, estimation of distribution algorithm, EDA, genetic algorithm,...
This paper proposes an approach based on Bacterial Foraging Algorithm (BFA) for optimal placement of Distribution Generations (DGs). The optimal sitting and sizing of distributed generation is formulated as a multi-objective function including the network power losses minimization and voltage profile improvement. BFA algorithm has been employed to optimize the problem. To demonstrate the effectiveness of the proposed approach, it has been applied to 33 and 69 bus systems. The results of the... Topics: Distributed Generation, Optimal Placement, Bacterial Foraging Algorithm (BFA), Genetic Algorithm...
Federated Cloud computing is one of the upcoming latest new computing paradigm where applications and data services are provided by multiple cloud providers over the Internet. Today‘s some of the business organizations use federated cloud environment. The Task management is the important role in federated cloud computing systems. Task scheduling problems are main which relate to the efficiency of the whole federated cloud computing facilities. The main focus is to study various problems,... Topics: Cloud Computing, Dynamic Scheduling, Genetic Algorithm, Optimization